The paper deals with automated methods for the design of security
protocols and their design using zero knowledge protocols, or protocols, where
it is possible to use zero knowledge protocols such as subprotocols.. Specific
emphasis is placed on the use of compositional method. The paper also include
the example of protocol design.